Analysis

  • max time kernel
    129s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 00:02

General

  • Target

    890ae754c8702a56389b63a23950ac9fe1a038db83ee5ca87e361c8207297f27.exe

  • Size

    79KB

  • MD5

    1410dca3bbd51cd2d4de18cf421983ec

  • SHA1

    c11c396aa96d2f9f85625f3450f71212bae6f36b

  • SHA256

    890ae754c8702a56389b63a23950ac9fe1a038db83ee5ca87e361c8207297f27

  • SHA512

    a90d0aae0037ad7bd656e60ec6f5d3003d7f3470d1e75ec3770e88c4cf65307aa861833868efa7b20cf4b8927b5c86affb0df59a8770f5d6e0aaf69955de82c8

  • SSDEEP

    1536:zvANfA7voIfaFOQA8AkqUhMb2nuy5wgIP0CSJ+5yOB8GMGlZ5G:zvANfvi9GdqU7uy5w9WMyON5G

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\890ae754c8702a56389b63a23950ac9fe1a038db83ee5ca87e361c8207297f27.exe
    "C:\Users\Admin\AppData\Local\Temp\890ae754c8702a56389b63a23950ac9fe1a038db83ee5ca87e361c8207297f27.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4552

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\[email protected]
    Filesize

    79KB

    MD5

    7c3b2e78f1090a7e974daaab2686f59d

    SHA1

    206b8e1ad9e955162b9dff4e7c80d81ad2fd02b3

    SHA256

    e898534ddeedc60a95d5b1971ce9e0695e7ebc7a195c6b1d7758a82c547d7bf5

    SHA512

    e6456dcddbeb5001316f2d3c76a38d41cc23c91bd119d8db06d70a10e7c68f6e087223f78f12e69f9d056af930ddc300d084a822cc31e26544c4bace207cc1f7

  • memory/388-5-0x0000000000400000-0x000000000041B000-memory.dmp
    Filesize

    108KB

  • memory/4552-6-0x0000000000400000-0x000000000041B000-memory.dmp
    Filesize

    108KB